envelope envelope search heart heart-on heart-off bookmark-on bookmark close clock arrow down arrow up list arrow right feed link tag glasses star share twitter ampersand hamburger add
Serendeputy
Sign In

Independent Newsfeed Engine
for the Open Web

The current open web, curated by people you follow on Twitter and organized by an intelligent software deputy you train and command.

Start by organizing your Twitter feed

How Serendeputy works for you

Cyber spying

  • Trending
  • Latest
  • Profile

Cyber spying tag sponsored by:

Russians Among Us: Sleeper Cells, Ghost Stories, and the Hunt for Putin's Spies

  • Overview of Russian GRU and SVR Cyberespionage Campaigns 1H 2022

    blog.bushidotoken.net | 1 day ago | Article Details | Related Articles | Share
    • Cyber spying
    • GRU
    • Overview
    • Russian
    • SVR
    • 482 Tags
    • 44 Tweets
    • 104 Twitter Lists
  • BRONZE STARLIGHT – Chinese APT Using Short-Lived Ransomware Families for Cyberespionage Activities | Cryptika Cybersecurity

    cryptika.com | 18 hours ago | Article Details | Related Articles | Share
    • Apt
    • Chinese
    • Computer security
    • Cyber spying
    • Ransomware
    • 427 Tags
    • 1 Tweet
  • Russian-backed hackers target Lithuanian websites

    thehill.com | 13 hours ago | Article Details | Related Articles | Share
    • Hackers
    • Lithuanian
    • Target
    • Website defacement
    • 131 Tags
    • 10 Tweets
    • 77 Twitter Lists
  • BRONZE STARLIGHT - Chinese APT Using Short-Lived Ransomware Families for Cyberespionage Activities - Cyber Security News

    cybersecuritynews.com | 1 day ago | Article Details | Related Articles | Share
    • Apt
    • Chinese
    • Computer security
    • Cyber spying
    • Ransomware
    • 157 Tags
    • 2 Tweets
    • 3 Twitter Lists
    • 1 Feed
  • Microsoft: Russian cyber spying targets 42 Ukraine allies

    dailyfreeman.com | 21 hours ago | Article Details | Related Articles | Share
    • Cyber spying
    • Espionage
    • Microsoft
    • Russian
    • Ukraine
    • 188 Tags
    • 1 Tweet
    • 1 Twitter List
    • 1 Feed
  • BRONZE STARLIGHT – Chinese APT Using Short-Lived Ransomware Families for Cyberespionage Activities

    isecurityfeed.wordpress.com | 1 day ago | Article Details | Related Articles | Share
    • Apt
    • Bronze
    • Chinese
    • Cyber spying
    • Ransomware
    • 34 Tags
    • 1 Tweet
    • 2 Twitter Lists
    • 1 Feed
  • China-linked APT Bronze Starlight deploys ransomware as a smokescreen | Hackademicus

    hackademicus.nl | 1 day ago | Article Details | Related Articles | Share
    • Apt
    • Deployment
    • Ransomware
    • Smokescreen
    • Starlight
    • 207 Tags
    • 5 Tweets
    • 141 Twitter Lists
    • 2 Feeds
  • Practical Ransomware Prevention Techniques & Practices That Won’t Break the Bank

    ian-barwise.medium.com | 8 hours ago | Article Details | Related Articles | Share
    • Break the Bank
    • Colonial Pipeline
    • Pragmatism
    • Ransomware
    • Techniques
    • 512 Tags
    • 1 Tweet
    • 6 Twitter Lists
  • Russia-Ukraine war and absence of cyber attacks | By Wg Cdr Jamail Abdul Nasir (R) - Pakistan Observer

    pakobserver.net | 8 hours ago | Article Details | Related Articles | Share
    • CDR
    • Cyber-attack
    • Gemayel family
    • Pakistan Observer
    • War
    • 356 Tags
    • 1 Tweet
    • 14 Twitter Lists
  • China’s Share of Ukraine - The American Spectator | USA News and PoliticsThe American Spectator | USA News and Politics

    spectator.org | 5 hours ago | Article Details | Related Articles | Share
    • China
    • Politics
    • Russians in Ukraine
    • The American Spectator
    • U.S.A.
    • 390 Tags
    • 2 Tweets
    • 1 Twitter List
  • Money is not The Goal of These Chinese Ransomware Attacks

    industrywired.com | 1 hour ago | Article Details | Related Articles | Share
    • Attack
    • Chinese
    • Goal
    • Money
    • Ransomware
    • 220 Tags
    • 1 Tweet
  • Russian cyber spying targets Ukraine allies

    source.ly | 2 days ago | Article Details | Related Articles | Share
    • Allies
    • Cyber spying
    • Espionage
    • Targets
    • Ukraine
    • 7 Tags
    • 1 Tweet
    • 4 Twitter Lists
  • China-linked APT hacking group targeting Australia and South-East Asia

    cybersecurityconnect.com.au | 19 hours ago | Article Details | Related Articles | Share
    • Apt
    • Australia
    • Hacking
    • Southeast Asia
    • Targeting
    • 294 Tags
    • 1 Tweet
    • 7 Twitter Lists
  • HHS Provides Tips For Strengthening Cyber Posture in Healthcare

    healthitsecurity.com | 16 hours ago | Article Details | Related Articles | Share
    • Chinese food therapy
    • Cyber
    • Health care
    • HHS
    • Posture
    • 209 Tags
    • 1 Tweet
    • 2 Twitter Lists
  • অপ্রশান্ত মহাসাগর

    pratyahikpath.wordpress.com | 1 hour ago | Article Details | Related Articles | Share
    • Korean Armistice Agreement
    • Park Geun-hye
    • PLA Unit 61398
    • Rodong Sinmun
    • Taepodong
    • 434 Tags
    • 1 Tweet
    • 2 Twitter Lists
  • Hiding Through a Maze of IoT Devices

    blog.0day.rocks | 15 hours ago | Article Details | Related Articles | Share
    • Device
    • Hiding
    • IOT
    • NAT traversal
    • Universal Plug and Play
    • 344 Tags
    • 1 Tweet
    • 4 Twitter Lists
  • China has grip on US higher education despite closure of Confucius Institutes

    washingtonexaminer.com | 17 hours ago | Article Details | Related Articles | Share
    • China
    • Closure
    • Confucius Institute
    • Grip
    • Higher Education
    • 400 Tags
    • 1 Tweet
    • 1 Linking Site
  • Florida Democrats' Website Redirected To Russia-Controlled RT Monday

    tampafp.com | 13 hours ago | Article Details | Related Articles | Share
    • Democrats
    • Florida Democratic Party
    • Redirected
    • 146 Tags
    • 1 Tweet
  • SHISH: Online Services Being Exploited by Cyber Espionage

    albaniandailynews.com | 2 days ago | Article Details | Related Articles | Share
    • Cyber spying
    • Espionage
    • Exploit
    • Online service provider
    • Shish
    • 133 Tags
    • 1 Tweet
    • 1 Twitter List
  • Social Engineering Evaluation - BAI Security

    baisecurity.net | 2 days ago | Article Details | Related Articles | Share
    • Evaluation
    • Security
    • Social engineering
    • 384 Tags
    • 3 Tweets
    • 141 Twitter Lists
  • Risky Biz News: US critical infrastructure needs better cyber insurance coverage

    riskybiznews.substack.com | 1 day ago | Article Details | Related Articles | Share
    • .biz
    • Coverage
    • Critical infrastructure
    • Cyber
    • Insurance
    • 522 Tags
    • 1 Tweet
    • 7 Twitter Lists
  • China still has grip on US higher education despite closure of Confucius Institutes

    msn.com | 14 hours ago | Article Details | Related Articles | Share
    • Avril Haines
    • China
    • Confucius Institute
    • Grip
    • Higher Education
    • 406 Tags
    • 1 Tweet
  • ToddyCat: an advanced threat actor targets high-profile entities with new malware - mid-east.info

    mid-east.info | 1 day ago | Article Details | Related Articles | Share
    • Advanced
    • Entities
    • Malware
    • Targets
    • Threat actor
    • 291 Tags
    • 1 Tweet
    • 1 Twitter List
    • 1 Feed
  • Toddycat: An Advanced Threat Actor Targets High-Profile Enti...

    menafn.com | 1 day ago | Article Details | Related Articles | Share
    • Advanced
    • Multiple working
    • Targets
    • Threat actor
    • 299 Tags
    • 2 Tweets
    • 3 Twitter Lists
  • Semi-Automated Cyber Threat Intelligence - ACT Platform v0.0.100 releases

    securityonline.info | 1 day ago | Article Details | Related Articles | Share
    • Cyber threat intelligence
    • Platform
    • 206 Tags
    • 3 Tweets
    • 10 Twitter Lists
    • 1 Feed
  • This week in Ransomware – Friday June 24th, 2022 | IT World Canada News

    itworldcanada.com | 1 day ago | Article Details | Related Articles | Share
    • Canada
    • Howard Solomon
    • Hui Loader
    • Ransomware
    • 238 Tags
    • 1 Tweet
    • 1 Twitter List
    • 1 Feed
  • Beijing-backed attackers use ransomware as a decoy while they conduct espionage

    theregister.com | 1 day ago | Article Details | Related Articles | Share
    • Attackers
    • Conduct
    • Decoy
    • Espionage
    • Ransomware
    • 141 Tags
    • 1 Tweet
    • 1 Twitter List
  • SPY NEWS: 2022 — Week 25

    medium.com | 2 days ago | Article Details | Related Articles | Share
    • Australian Security Intelligence Organisation
    • Lockheed U-2
    • Parliament of Victoria
    • Remembrance poppy
    • Spy
    • 598 Tags
    • 1 Tweet
    • 4 Twitter Lists
  • Daily Drop (174)

    bragg.substack.com | 2 days ago | Article Details | Related Articles | Share
    • Drop
    • Gh0st RAT
    • LoadingReadyRun
    • Log4j
    • Production control
    • 504 Tags
    • 1 Linking Site
  • Euro Police Bust a Cyber Crime Gang Behind Multimillion-Euro Phishing Scams

    immuniweb.com | 3 days ago | Article Details | Related Articles | Share
    • Bust
    • Cybercrime
    • Gang
    • Phishing
    • Police
    • 310 Tags
    • 1 Tweet
    • 3 Twitter Lists
  • Are you a Cyber Victim?

    sbaconsulting.com | 3 days ago | Article Details | Related Articles | Share
    • Cyber
    • Victim
    • 141 Tags
    • 1 Tweet
    • 11 Twitter Lists
  • Apple Warns of 3 iOS Zero-Day Security Vulnerabilities Exploited in the Wild - GBLworld -Top TECH News Across The World

    gblworld.com | 2 days ago | Article Details | Related Articles | Share
    • Exploit
    • In the Wild
    • iOS
    • Security
    • Vulnerability
    • 127 Tags
    • 1 Tweet
  • Essay: Abortion is Normal

    feministgiant.com | 2 days ago | Article Details | Related Articles | Share
    • Abortion in Egypt
    • Billie Holiday Sings
    • Essay
    • Jaishri Abichandani
    • Normal
    • 374 Tags
    • 1 Tweet
    • 1 Twitter List
  • Russian cyberspying targets 42 Ukraine allies, Microsoft says

    nbcnews.com | 5 days ago | Article Details | Related Articles | Share
    • Cyber spying
    • Microsoft
    • Russian
    • Targets
    • Ukraine
    • 186 Tags
    • 23 Tweets
    • 322 Twitter Lists
    • 1 Linking Site
  • Russia launched cyber espionage campaigns against Ukraine allies: Microsoft

    thehill.com | 5 days ago | Article Details | Related Articles | Share
    • Allies
    • Cyber spying
    • Espionage
    • Russia
    • Ukraine
    • 186 Tags
    • 7 Tweets
    • 189 Twitter Lists
    • 3 Linking Sites
  • State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks

    thehackernews.com | 4 days ago | Article Details | Related Articles | Share
    • Cyber spying
    • Decoy
    • Espionage
    • Hackers
    • Ransomware
    • 270 Tags
    • 22 Tweets
    • 291 Twitter Lists
  • Chinese hackers use ransomware as decoy for cyber espionage

    bleepingcomputer.com | 4 days ago | Article Details | Related Articles | Share
    • Cyber spying
    • Decoy
    • Espionage
    • Hackers
    • Ransomware
    • 182 Tags
    • 43 Tweets
    • 125 Twitter Lists
    • 2 Linking Sites
  • Microsoft says Russia has stepped up cyber espionage against the US and Ukraine allies

    cnn.com | 5 days ago | Article Details | Related Articles | Share
    • Allies
    • Cyber spying
    • Espionage
    • Russia
    • Ukraine
    • 289 Tags
    • 25 Tweets
    • 81 Twitter Lists
    • 1 Linking Site
    • 1 Feed
  • Russia Launched Cyber Espionage Campaigns Against Ukraine Allies, Microsoft Says - Slashdot

    tech.slashdot.org | 5 days ago | Article Details | Related Articles | Share
    • Allies
    • Cyber spying
    • Espionage
    • Russia
    • Ukraine
    • 10 Tags
    • 2 Tweets
    • 24 Twitter Lists
    • 1 Feed
  • These hackers are spreading ransomware as a distraction - to hide their cyber spying

    zdnet.com | 3 days ago | Article Details | Related Articles | Share
    • Cyber spying
    • Distraction
    • Espionage
    • Hackers
    • Ransomware
    • 202 Tags
    • 4 Tweets
    • 49 Twitter Lists
  • Microsoft: Russian Cyber Spying Targets 42 Ukraine Allies | SecurityWeek.Com

    securityweek.com | 5 days ago | Article Details | Related Articles | Share
    • Cyber spying
    • Espionage
    • Microsoft
    • Targets
    • Ukraine
    • 183 Tags
    • 9 Tweets
    • 30 Twitter Lists
  • Chinese LuoYu hackers deploy cyber-espionage malware via app updates

    bleepingcomputer.com | 7 days ago | Article Details | Related Articles | Share
    • Chinese
    • Cyber spying
    • Deployment
    • Hackers
    • Malware
    • 193 Tags
    • 15 Tweets
    • 34 Twitter Lists
  • About
  • How Serendeputy Works
  • Privacy Policy
  • Terms of Service

  • Serendeputy Blog
  • Customer Forum
  • @Serendeputy